# Archive
Browse past daily curated stories
Thursday, April 09, 2026
-
1Dark Reading generalRussia's Forest Blizzard Nabs Rafts of Logins Via SOHO Routers
Russia's APT28 (Forest Blizzard) is conducting espionage by compromising vulnerable SOHO routers and modifying DNS settings to intercept credentials without deploying traditional malware. The campaign demonstrates a 'malwareless' approach to cyber espionage, allowing the group to spy on global organizations through simple router configuration changes.
-
2SecurityWeek generalUS Disrupts Russian Espionage Operation Involving Hacked Routers and DNS Hijacking
U.S. authorities disrupted APT28's operation exploiting vulnerable TP-Link and MikroTik routers across 120 countries to conduct adversary-in-the-middle attacks for credential theft. The Russian military hackers modified router DNS settings to hijack traffic and steal Microsoft 365 logins, demonstrating how end-of-life consumer devices become strategic intelligence assets.
-
3SecurityWeek generalIran-Linked Hackers Disrupt US Critical Infrastructure via PLC Attacks
Iranian hackers are actively targeting Internet-exposed Rockwell/Allen-Bradley programmable logic controllers across U.S. critical infrastructure including energy and water sectors. The attacks have caused operational disruptions, file manipulation, and financial losses since the onset of U.S.-Israel strikes against Iran, marking an escalation in OT-focused warfare.
-
4SecurityWeek generalFBI: Cybercrime Losses Neared $21 Billion in 2025
FBI received over 1 million cybercrime complaints in 2025 with losses reaching $20.9 billion, representing a 26% increase from the previous year. Investment fraud, business email compromise, and tech support scams caused the highest financial damages, highlighting the evolving landscape of financially motivated cybercrime.
-
5BleepingComputer general13-year-old bug in ActiveMQ lets hackers remotely execute commands
A 13-year-old remote code execution vulnerability in Apache ActiveMQ Classic allows attackers to execute arbitrary commands on affected systems. The bug remained undetected since 2011 and requires authentication for exploitation, though researchers note another flaw exposes the Jolokia API without authentication.
-
6SecurityWeek generalAnthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks
Anthropic unveiled Claude Mythos as part of Project Glasswing, an AI model specifically designed for cybersecurity that has reportedly identified thousands of zero-day vulnerabilities across major systems. The initiative aims to secure critical software before similar AI-powered offensive capabilities become available to attackers.
-
7Schneier on Security threat-intelPython Supply-Chain Compromise
A malicious supply chain compromise affected Python Package Index package litellm version 1.82.8, which contained a malicious .pth file that executes automatically on every Python interpreter startup. The attack demonstrates how package managers can be weaponized to achieve persistent code execution without requiring explicit imports.
-
8BleepingComputer generalCISA orders feds to patch exploited Ivanti EPMM flaw by Sunday
CISA ordered federal agencies to patch a critical Ivanti Endpoint Manager Mobile (EPMM) vulnerability by Sunday that has been actively exploited since January. The directive gives agencies just four days to secure their systems against this critical-severity flaw affecting mobile device management infrastructure.
-
9The Hacker News generalN. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust
North Korean hackers expanded the Contagious Interview campaign by publishing 1,700 malicious packages across npm, PyPI, Go, Rust, and PHP ecosystems. The packages impersonate legitimate developer tools while functioning as malware loaders, representing a coordinated supply chain attack targeting multiple programming environments.
-
10BleepingComputer generalHackers use pixel-large SVG trick to hide credit card stealer
A massive campaign targeting nearly 100 Magento e-commerce stores hides credit card-stealing code inside pixel-sized SVG images. The technique allows attackers to inject payment skimmers that are virtually invisible to visual inspection while maintaining full functionality for harvesting customer payment data.